Splunk Search

How can I do a sum of count for if statement?

tamduong16
Contributor

When I do a stats count by a specific column. The count for each of them work. Here is the picture:

alt text

But when I actually try to count only the Failed Attempt call. The result is 0. Did I do something wrong here?

alt text

0 Karma
1 Solution

somesoni2
Revered Legend

In the eval command expressions (and where command too), if a field name contains spaces, you need to enclose them in single quotes not double quotes. With double quotes, they are treated as literal string instead of fields. You did it correctly in line 2 (replace command) but missed in line three. Correcting that would resolve your issue.

Like this

index="monthlycdr"
| eval "Disconnect Info"=replace('Disconnect Info' ,"\"","")
| eval "Failure Rate" = if(match('Disconnect Info',"(?i)Failed Attempt"),1,0)
| stats sum("Failure Rate")

View solution in original post

cmerriman
Super Champion

can you avoid the spaces? SPL works better, generally, without them.

index=monthlycdr
|eval DisconnectInfo=replace('Disconnect Info',"\"","")
|eval "FailureRate"=if(match(DisconnectInfo,"(?i)Failed Attempt"),1,0)
|stats sum(FailureRate) as "Failure Rate"

somesoni2
Revered Legend

In the eval command expressions (and where command too), if a field name contains spaces, you need to enclose them in single quotes not double quotes. With double quotes, they are treated as literal string instead of fields. You did it correctly in line 2 (replace command) but missed in line three. Correcting that would resolve your issue.

Like this

index="monthlycdr"
| eval "Disconnect Info"=replace('Disconnect Info' ,"\"","")
| eval "Failure Rate" = if(match('Disconnect Info',"(?i)Failed Attempt"),1,0)
| stats sum("Failure Rate")

niketn
Legend

I think following is the only query required. | eval "Disconnect Info"=replace('Disconnect Info' ,"\"","") before stats is required only if double quotes may be present between "Failed Attempt" pattern being matched.

 index="monthlycdr"
|  stats count(eval(match('Disconnect Info',"(?i)^Failed Attempt"))) as "Failed Attempt"
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

tamduong16
Contributor

thanks guys

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...